So someone on /jp/ created a Western version of Ayashii World (sadly offline - RIP) and it got me wondering - we haven't had a true Western equivalent to 2ch ever since world2ch imploded all those years ago, and it's high time we got one. So what do you think? Would you post on a new Western version of 2ch?
> lmao bruh lets see https://2chan.net ... > surprised.jpg > it's all in japanese !!111111 > posts something in japanese > jp以外のipアドレスです > gets banned because IP not from Japan > realizes the bullshit > .... > FUUUUUUUUUUUCKKKKKKKKKKKKKKKKK
FUCCCCKKKKKKKKKK HOW AM I SUPPOSED TO POST THEN ?? THROUGH A FUCKING EXIT NODE FROM JAPAN ??? THOSE EXIT NODES DON'T EVEN EXIST FUCCCCCC!!!!!!!!!!1111111111111
You is one brave man ? The world is bad for you ? The world transform you in one bag trash ? You have hate the people for this ? You want restart the world ? I know how make it !!! One Bat, One puncture, One Brave man, and one bit luck, But if you survive, You have the power for restart the world. With one bat virus inside in body. The slavers no born of the free men. Good look Brave Man
without Richard Stallman, GNU/Linux distros wouldn't exist, freedom wouldn't exist in computing(therefore in most of ours lifes, don't you value freedom?). and "open source" was created by some members of the free-software-movement who didn't agree with its philosophical views and only wanted its practicality and better way of development (so "open source" also wouldn't exist). the GPL2 is what keeps the linux Kernel safe. he should be leader of fsf
I like GNU and its utils and its well-made commands. GPL is also great, examples of GOOD free software: zsnes (the BEST and most NOSTALGIC SNES emulator), PPSSPP (BEST PSP emulator), redream (BEST dreamcast emulator), KDE (best desktop imo), GNOME (also good), gimp, krita and etc etc. they're all in GPL, many free software are the best in quality. tor is in BSD license BUT it's also free software, if richard didn't start free software movement, free software in other licenses (such as in BSD) also wouldn't exist (btw I'm using tor, thanks for not blocking me >_<;*)
Endware is a suite of programs geared towards internet privacy, security, and anonymity.
Endwall: endwall.sh is an iptables based firewall script designed to be implemented on any linux distribution shipped with iptables. endwall.sh is based on default drop policies, coupled with a novel strategy of passing packets on local host ports only for those enabled by the enduser. It comes with a variety of well used ports enabled with several additional port passing configurations available by uncommenting the script. It provides essential security to a new user.
Endsets: endsets.sh is a script that adds blacklisting and whitelisting functionality to endwall.sh. It depends on the program ipset. It is persistent on reboot if you enable ipset as a service. This is the recommended blacklisting tool for endwall if you are running a server or planning on opening up ports and services to the public and will require daily blacklisting of new incomming IPs.
Endlists: endlists.sh is a traditional text file list based blacklisting and whitelisting script. It has slow performance, and can't be updated on the fly. Good for <1000 ip subnets, very tedious and slow to run for more than that. Blocks the IPs by adding them as individual rules to the iptables ruleset. Works but not recommended for heavy duty on a server. May be useful for workstation use to block ip ranges if you are not opening up ports and services to public clients.
Endtools: endtools are a collection of scripts including alogz.sh, mlogz.sh, spamlogz.sh and iplookup.py. These scripts will help to service an enduser of endwall in adminstering endsets/endlists.
iplookup.py is a geoiplookup script written in python and requires python and pygeoip. It has simmilar functionality to maxmind's geoiplookup program and uses the maxmind *.dat files.
spamlogz.sh is a script that searches through log files to find flagged log entries flagged in endwall.sh, endsets.sh and endlists.sh.
alogz.sh is a daily log reading script designed to read the output of an apache http server's log output.
mlogz.sh is a daily log reading script designed to read the output of a postfix smtp server's log output.
>>1468 Automated forced rename to name(1).ext and if that already exists, the next one that isn't already used without having something abysmal like name(1)(1).ext, that's a big no.
Let me rephrase some of what I said before to be extra clear
I want whatever directory of choosing to copy all files recursively in all the folders in that directory into a new destination folder without copying the folders in the previous directory, without overwriting any files in the destination folder and that includes the files that's in the directory that has the same name and file extension.
Doesn't need to be in bash, use whatever programming language you like that can be executed in the terminal by putting it in a .bin or whatever and chmod +x and all that typical basic stuff that's on the end user to deal with.
Try it out and let us know how it works. Post any additional product ideas, feature requests, comments, or bug reports below.
I'm starting to get really busy with school so any new requests might not be looked at or filled until mid December. Post them anyways I might tackle it if it looks interesting and I have a spare hour or two on a Friday night.
>>1472 It seems to work exactly as planned but I'm not quite certain myself. I'm using wayback_machine_downloader https://github.com/hartator/wayback-machine-downloader and using condense.sh to get them all under one folder. Some of the files the wayback machine had downloaded are merely links with whatever extension file and name but it's 0 bytes which there's a shit ton of them for certain websites I want to save. I'm no developer, zero desire to learn how to code so even thinking about making a script like this makes my eyes roll backwards. If it's a simple one liner I'll just add it to my .zshrc as an alias but stuff like this is way beyond my capabilities and I just can't be bothered.
Also, a feature to delete 1x1 pixel images would be nice.
I have uploaded a working port of endstream for openBSD endstream_bsd.sh.
It's currently missing most of the channels. Getting this to work starting with endstream.sh, required deleting most of the channels as there is some syntax bug that ksh doesn't like on openBSD. I'll be reading the channels incrementally and deleting the channels that cause the problem running endstream.sh until its up to date. Next I'll make a port of endradio.sh and endtv.sh for openBSD. Work in progress. Test it out and let me know if it's working for you.
>>1733 This was tested working on a fresh install of OpenBSD 6.9 on a Dell Vostro Core 2 duo laptop from 2006. mpv and youtube-dl were added from pkg_add. Video and Sound playback is fine at high resolutions and somewhat choppy at 1920x1080 resolution streams, but its working for me. I'll do some more work on this product on the weekend.
Hak5 Discord and Slack Used To Spread RATs - ThreatWire https://youtube.com/watch?v=mdTnhUJFnno [Embed] Apr 13, 2021 Facebook downplays the data leak, linkedin appears to be targeted in a similar attack, and Discord and Slack are being used to spread remote access trojans! All that coming up now on ThreatWire.
Hak5 Colonial Pipeline Hit With Ransomware; Apple AirTags Hacked - ThreatWire https://youtube.com/watch?v=QjLvIDWnc3w [Embed] May 11, 2021 A Qualcomm SoC could be exploited by attackers, the US’s biggest gas pipeline is hit with ransomware, and Apple AirTags get hacked!
Hak5 7 Year Old Linux Flaw Newly Discovered - ThreatWire https://youtube.com/watch?v=12oSZ3FVXBA [Embed] Jun 15, 2021 "EA Source Code was Stolen, a 7 Year Old Linux Flaw was Discovered, and 1.2 Terabytes of Data was Mysteriously Stolen from millions of Windows pcs!"
In NSW last year, I was made stupider by the Australian Federal Government, and I would like to warn others about this tactic as it is used by Australia. If you have an enemy, or in this case, a perceived enemy, you can't beat them up without an investigation, you can't kill them without an investigation, but if you were to make them 20% less intelligent you completely remove their ability to do what they intend to do, and that is what Australia did to me. I have no idea about their motivations, but that's what they did. Keep in mind, even something as simple as lead powder bought from your local hardware or online for $20 can make someone less intelligent and act out violently as well, so this tactic can be done by anyone at all on earth.
I contacted the CIA, FBI, consulate, embassy, and drove over 7,000kms to Pine Gap to whine in person, all to no avail. I have not even been contacted about this, despite complaining 24/7, sending over 100k emails, and going to everyone including giving letters to the Chinese consulate etc. Therefore as this tactic is 100% effective, and there is no chance of ever being caught, I want to warn others to watch out for Australia using this tactic on them, as they will have no recourse once the attack is carried out, therefore prevention is the only way.
Keep in mind, if there is a criminal group being investigated they could easily make the investigators stupider as a tactic, or if there is a trail then they could make the prosecutor stupider, and it would be undetectable and set them free more effectively than killing the person. That's one reason why some of the thousands of people I reported this to should have cared, but when you have Australia blocking and spoofing and lying it's impossible to get attention.
As it is, it's been over a year since I originally started doing all I can to get attention to this issue. I spent 6 months being tortured in NSW, and the last 6 months in NT being kept broke, I have only recently been allowed to get a job, and this Friday my last financial link to the USA was cut off, I was hit with a fradulent charge and forced to cancel my only US debit card. I am now completely exposed in every way to the very people who lowered my IQ and tortured me for 6 months in NSW, and the people who kept me broke or busy for 6 months here in the NT (as if I want anything besides to be able to move the fuck on!!!!) perhaps operating under the assumption that if I am busy or broke I will be less likely to be believed or get help. It's quite the opposite, all I have been begging for every day is to be allowed to achieve a middle class income so I can start to heal from the trauma.
There's a lot more than this, I live at Unit 22, 3 Larapinta Drive, Gillen, NT, 0870, and my name is Max Freedom Moussa Pollard. Please do not contact Australia, they will use it as an excuse to hurt me further. It's been a very very very long time and believe me. Please note I am totally fine now, merely annoyed and as you can imagine it's not the kind of thing you will ever get over, so I'm mad. Once I have a middle class income I will be able to start the healing process, but until then I am very much PTSD. Totally safe, secure and happy at the moment besides the fact I have been kept completely broke, and I'm now cut off from all US finance on top of that.
It goes without saying that nobody will complain as much as me about this, and I doubt anyone besides me would notice, therefore taking my case as an example, this is a crime nobody will ever be caught for. This is a crime with no chance of being caught for, ever. It can be done on anyone 1000x ways, it's evil.
>>14775 well, why not report it into other sites ? sites like this one are good for free speech!
though, news sites censor quite a ton to keep the normies under control, would be unsurprising if they censor or twist your words for their liking... maybe if you license your documentation under cc-by-sa-3.0, cc-by-nc-nd-3.0, or etc. it'll help on them not manipulating/twisting your words I suppose
>Former antivirus magnate John McAfee was found dead in his prison cell in Barcelona just hours after a Spanish court approved his extradition to the US on tax evasion charges, authorities in Madrid have told national media. >McAfee, 75, was found in his cell at the Sant Esteve Sesrovires jail on Wednesday evening, Spanish media reported, citing an official statement from the Ministry of Justice. Guards and prison medical staff intervened and attempted resuscitation, but to no avail, the ministry said. >Investigators have been dispatched to the jail to probe the cause of death, but “everything indicates it could be a suicide,” the ministry added. >Earlier Wednesday, a Spanish court ruled to allow his extradition to the US on charges of evading taxes between 2014 and 2018, which could have landed him in prison for up to 30 years. US authorities also had civil charges pending against McAfee for an estimated $13 million in profits from cryptocurrency schemes. McAfee was arrested in Spain in October 2020 and held in jail as a “flight risk” pending his extradition hearing.
usually, it would require to externally/internally flash a libreboot bios and/or remove Intel ME with me_cleaner then install a fully free system such as parabola, so in this way the CIA can't glow on that computer.
fsf's ryf approved notebooks meet the requirements of freedom in hardware. sadly those resources aren't so accessible.. buying a ThinkPad made before intel ME and internally flashing libreboot (specifically X60) seems to be the easiest way to replicate what fsf did. in which sadly I couldn't find any X60 out there.
RISC-V powered computers are also an alternative, though I don't know any computer/notebook that has a RISC-V CPU .
ARM powered computers such as raspberry pi 4 seems to be a safe alternative since I haven't seen anyone whistleblowing about backdoors nor spyware on their hardware nor software, is it safe though ? what are your thoughts on this matter ?
ive been thinking on building a raspberry machine for some time now.
i personally like the idea of having like a sort of motherboard for multiple computing modules since the rpi foundation released their modules. this would make it possible to have a powerful computer in a fist-size box
the only thing stopping me from doing that is that theres is still no commercial solution for powering the machine from 18650 batteries, if someone could come up with a scalable solution to this i would definetely give it a try. and here i mean complete and efficient power management like charging and also an input for power from ac outlets.
would you care to explain what intel me is? is it the new secure boot method that comes preinstalled on the board chips? excuse my ignorance on this subject
This shit has been around longer than Intel Management Engine. Intel AMT was in vPro product lines of the Core2 era. Mainly found in laptops, but also likely in the mainboards of business oriented workstations.
This is from 2007:
a riscv computer, hardware completely 100% open source, though is it also free? suppose it's even better than those thinkpads, since now there is hardware source code, we can just see and change what we don't like and do anything, effectively putting an end to surveillance.
So I want to get into RFID. I'm no programmer, I'm basicaly a low-level IT support guy, with very basic code understanding (studied C, Html/CSS and java just a bit). I'm interested in RFID about my company's vending machine, but also about subdermal implants, and maybe in the future for malicious intents.
Can anyone point me on some ressources, or even just share some RFID dumps I could study/compare?
I know it's not quite as simple as the fear-mongers want to present it as.
At work, all our items are tagged, now instead of just an external barcode but also an internal RFID tag. Even buying them 100K at a whack they were $0.40/ea. And fifty or so people were set aside to go through and tag everything we own. Three years later as we move equipment from office to office we start finding errors. Serious errors. Turns out our tracking vendor had settled on one particular tag format, our software didn't have that so we'd chosen something "pretty close" but our vendor went through a small, internal reconstruction and came out using their information a bit differently. Our software couldn't read their tagged information and it took months of experts scratching their heads to figure out that "pretty close" wasn't close enough.
SO the big bosses sent out emails that "hey, you guys, you've been doing it wrong all this time shame on you." And politely refused to take note of how those bosses' trained people set up all our equipment on what turned out to be a misunderstanding.
Reading the tag isn't all that hard -- any antenna can energize and read off the contents. But you might need a human to interpret the results, especially if the tag format they're actually using is different from the one they publish that they agreed to use.
Sorry I can't be of more specific help, but searching out the high-level tag datasheets might be an okay start.
The big PC makers all have competent engineers and they occasionally will produce a good product, particularly for their top spec machine. For some reason people really latch onto this concept with Lenovo, but generally ignore other excellent pro grade hardware, notably from HP and Dell. I've worked with these three brands and have to say on average the HP are the best, followed by Dell, with Lenovo taking third.
You can certainly point to exceptions of this trend, and there's good and band from any group, but on average you'll pay more for less with Lenovo.
With all that shit talking out of the way, the idea that should be lauded is buying a top spec machine used rather than the walmart special garbage new. You can do this with practically any brand and come out ahead, especially when you figure that even if something needs to be replaced it won't break your budget.
Duuuuude! A Lenovo T420 is totally righteous. It's the highest of high tech, which is of course why they called it a 420. It even has a touch-sensitive bud tray built right into the middle of the keyboard. That is a Good Choice my man. Nothing says "I am the Bong Lord" like rolling in with a 420.
Might be late to the table with this reply, but yes OP, absolutely a fantastic choice in every possible way. Upgrade the HD to an SSD upgrade ram to max (8gb I think). Install linux (devuan preferably ) and rock that puppy!
Yes you are. A T420 is in fact righteous and a good choice. They will last. (and the touchpad is nothing but a bud tray - you will disable it and only use the red pencil eraser mouse because if your sleeve so much as brushes the pad the cursor jumps across the screen)
>IT'S B-BLOATED!!!!1! And you're telling me you can't afford a $200 PC from the past 5 years that will run it seamlessly? Sell your 15 year old Thinkpads that can't even into AVX or non-fixed pipeline GPUs.
>SECURITY RISK!1!!!!1! Have you anything to hide? No one cares about you. You aren't developing anything significant. You aren't a threat to the current ecosystem. You aren't a terrorist/spy/lone-wolf actor. FVEY has better places to spend its resources on. You're already being watched with facial recognition, Low-Earth orbit imagery satellites, and backbone-level deep-packet inspection.
You can disable the telemetry in settings. Go a step further too and get the Enterprise edition with minimal software preinstalled.
>BROKEN AND BUGGY1!!1! In the beginning? Sure, but now its quite stable, and you'll be hardpressed to come across any problems. Linux, on the other hand, presents you with hours of work, ranging from broken audio to missing files to a lack of hardware and application support.
>NON-FREE!11!!1! You're paying for consistent updates and almost full support for any and every application in existence. The user experience and interface is only beaten by Mac OS from Apple, and is lightyears ahead of anything Linux could bring to the table.
You don't take advantage of FOSS. You've never looked into the software to determine how it works.
>MICROSOFT IS SHITTY COMPANY11!!!!!1! And Stallman is a foot-eating pedophile. Separate the art from the artist.
>NON-CUSTOMIZABLE!1!!1! Windows is utilitarian with a focus on getting shit done. It won't waste your time with hundreds of customizable options and features. It just works. Imagine spending 10 minutes writing assembly code every time you wanted to use your microwave. The people who use windows only care about the applications inside of it, not stupid crap like sub-pixel rendering and kernel parameters.
>NORMALFAG1!!!!!11! Your elitism is nothing. "Normal" people are happy, fulfilled, and have their heads on straight. You on the other hand have spent countless hours behind a screen, posting on strictly anonymous websites, angry about the state of the world and how you're so much better than everyone else.
>>14682 That's just an ANSI from textfiles.com, so you can grab them from there if you want.
Here's something cool though: 8086tiny. It's an emulator that supports text mode output. It translates CGA text mode video memory ops to the equivalent ANSI terminal escape sequences. So with any decent terminal (that allows you to load a Codepage 437 font) you can play old school DOS text games without needing any kind of graphics device at all. So here is ZZT running on my Linux terminal.
I tried running it in a GNU Screen session, and that works too, but sometimes the characters aren't aligned exactly right. I guess that's just expecting too much, so instead I run it on a bare tty.
>>14460 >bloated You're saying that running windogs on some cosnsumer laptop is the same as running a sane operating system on a workstation. the quality is just differen't, you'll hvae a way better experience with a lighter OS and a quality computer >security risk >i have nothing to hide faggot, let me look at your private chats then, i'm sure you won't mind >broken and buggy, "in the beginning" its shit, you have to be braindead to actually think its not dogshit >non-free, "service" imagine paying for an OS. and one that doesn't even let you do your job on it. try programming in C with it, in any unix-like OS the environment comes baked in due to its design. you'll have to download every piece of dogshit application to compile a hello world in windows. its a OS for children >non costumizable >utilitarian enjoy your ADS on your fucking START screen lmao. on any other OS you download a package and be done with it, with windows you literally need to debloat it with DIM editing >i'm a proud normie glad to know you're proud cattle. its not about elitism, its about not being the lowest common denominator
Consumer Reports said Thursday it was “easily” able to trick Tesla’s Autopilot system to operate without anyone in the driver’s seat. The publication’s test came amid questions about the safety of the company’s advanced driver assist system in the aftermath of a fatal crash in Texas in which authorities said there was no one behind the steering wheel.
Using a weighted chain attached to the steering wheel to simulate the pressure of the driver’s hands, two Consumer Reports researchers were able to use the steering wheel dial on a Tesla Model Y to accelerate from a full stop, and then “drive” around on a closed-course test track for several miles — all while sitting in the passenger seat and backseat. They stopped the vehicle by again using the dial to bring the speed back down to zero.
Tricking the Tesla to operate without someone behind the wheel was as simple as keeping the driver’s seatbelt buckled, not opening the driver’s side door during the test, and using the weight to simulate hands on the steering wheel.
“The car drove up and down the half-mile lane of our track, repeatedly, never noting that no one was in the driver’s seat, never noting that there was no one touching the steering wheel, never noting there was no weight on the seat,” Jake Fisher, CR’s senior director of auto testing, said in a statement. “It was a bit frightening when we realized how easy it was to defeat the safeguards, which we proved were clearly insufficient.”
The solution is simple. Cops love confiscating shit. Whenever they catch a retard alone in their Tesla in the back seat cruising down the freeway they should just confiscate it for their local D.A.R.E. program. One or two of those in the news and problem solved.
>>14695 how the fuck is this "security concern" telsa's fault? he literally had to make a device and purposeley leave the seatbelt on, as well as sneak out of the car to pull it off. you're blaming the tools for malicious behavior here
nice try grandpa are you aiming for privacy, anonymity, security? VMs are unreliable from a paranoid security standpoint due to complexity, nevertheless if they provide anonymity, it may be worth it against larger foes that can compromise security with their access to exploits. Similarly with Tor Browser Bundle, sometimes it is better to blend in rather than to obscure your identity. a hoodie will be less conspicuous than a facemask. >>1249 >don't post modern photos except PNGs because of exif you can strip exif data using 'exiftool' and other solutions. I have heard stories about cameras having hidden codes (and more likely, repeatable and detectable design flaws) that can be used to identify the module, but that's real rumor oojie boojie >avoid all digitized vehicles avoid vehicles especially with push-button ignition, vehicles with a disabled wireless unlocking mechanism would be preferable but there are vehicles with an option to disable the keyless wireless fob.
>>1248 >don't use social media endchan is social media >use a cheap private vpn use someone else's vpn, don't leave a paper trail of payment leading to your credit card >do not buy green appliances enjoy getting vanned because your electricity company can tell when you're browsing the internet via the smart meter. green is just a color, but energy efficient appliances are easier to run off battery power and/or solar power sources. >>1167 >responding to phishing attempts at all
I'm not an expert but I have an IQ over 9000. How I might attack a password. A. List attack I will get a list of "common passwords" derived from compromised user password list (the user account you made in ten seconds, 5 month ago because some Jew webpage made you). >"12345678" and "nopassword". B. low entropy Brute force of the password list Common passwords with one character variance, common passwords with 2 character variance. >1234s6789, Nopassword1 The site made you add a symbol and a number, I'm so scared.
It's only if you got this far that any real effort has to be made, honestly if you're not special I will just give up and find a stupider person.
C. dictionary attack Instead of guessing gibberish I will use whole words. Long passwords are often made up of whole words and at this point I know your password is fairly long. There are far more words in any given language than characters (this BTFO's Chinese users incidentally). Many common phrases will already have been covered in A. "common passwords"
>Continue browsing the game list, to find the profile you are after.
>Your account has been banned. If you believe this is a mistake and want to be unbanned, please contact us. Try searching:
Is it your contention that you referencing a GPL'd library function makes your program a non-seperable derivative work of the GPL'd library?
Is that your contention? Are you a fucking retard? Oh, you're a programmer!
I bet you believe that editing someone else's code and then making a "diff" of your changes makes that a seperable non-derivative work too!
Stupid fucking piece of shit. Here's a hint: You can "link" GPL'd code as you wish from anywhere under US jurisprudence. You cannot distribute diffs of changes you made to the GPL'd library/kernel/etc itself with ANY additional terms.
>>My body my ch- >Doesn't apply to infectious diseases. You don't have the right to infect other people. Yes you do, you piece of shit. You come to force us to "vaxx" and we will torture you to death. Do you understand you piece of fucking shit?
We will not "sacrifice" for your society that denies us cute young virgin girls as brides. We are your enemy. Do you understand you piece of fucking shit?
>https://www.dvidshub.net/news/47641/marines-teach-nawa-students-dodgeball-first-girl-attends-school > An Afghan girl stares at Warrant Officer Troy D. Anstine, executive officer, Headquarters and Service Company, 1st Battalion, 3rd Marine Regiment, as he explains her coloring assignment at the school near Forward Operating Base Geronimo March 31. She cautiously entered the school compound after the dodgeball game and is the first girl to attend class at the school. Marines said they hope to encourage more girls from the area to attend class in the future. Photo by Sgt. Brian Tuthill > > Just before the game had finished, an 8-year-old girl arrived to the school with three other young boys, who quickly joined the group of students while she kept her distance outside the compound. > > After the game, the school\u2019s Pashto interpreter returned and students went back to their studies. They recited and wrote Pashto numbers and then took on coloring assignments requiring them to pair the numbers to colors and color in the appropriate areas. The girl slowly and cautiously made her way into the compound and joined the class already in session.
It turns out that MS Windows NT has an 80% market share in the Desktop Operating Systems Market (whatever that is...) So in all likelihood, if you work a job anywhere, you will be forced to sit down and work on one of these machines running this well known gem of an operating system. You probably won't have administrator rights, but that's OK, we'll make do.
In reality there is no Windows security but in this thread we will try to make life a little bit better even if it is just for a placebo effect. Also Windows hackers come and show us how you hack us up real good, and help our poor unprivileged users gain administrator rights without a password, so that they can install Mahjong. Windows Advanced Firewall, Registry Editing, Browsers, etc. Post all the tips and tricks to make Windows NT better than ever.
Also this thread can include information for securing and running ReactOS, which might suit some people's needs as well. I'll set up threads for other operating systems and how to set them up (IllumOS, DOS, etc) , as I bring them online to test a play around with. This will happen over summer, I'm jam packed with school stuff until spring.
Again such boards might go better in >>>/h4x0r/. I'll think about the best way to present the info. Again the focus will be on tip sharing for poweruser stuff (scripting, settings etc) and security (Crypto, filesystems, firewalls, etc) and network communications on each of the operating systems.
Whilst setting up one of my development laptops to port some software to Windows I noticed Windows 10 doing crazy things like installing or updating apps and games by default after initial setup. The one I noticed in particular was Candy Crush Soda Saga which for those who don’t know of it is some cheesy little puzzle game originally for consumer devices. I honestly did not want software like this near to a development machine. It has also been reported that Windows 10 now also updates core system software without notifying the user. Surely this destroys any vaguely deterministic behaviour, in my opinion making Windows 10 by default almost useless for development testbeds. Deciding instead to start from scratch but this time to set the inbuilt Windows Firewall to be very restrictive and only allow a few select programs to communicate. In this case all I really needed to be online was Firefox, Subversion and Putty. To my amusement (and astonishment) I found out that the Windows firewall could be modified to give access very easily by programs during installation (usually because this task needs to be done with admin privileges). It also seems that Windows store Apps can change the windows firewall settings at any point. One way to get around this issue could be to install a 3rd party firewall that most software will not have knowledge about and thus not attempt to break through. However the only decent firewall I have used was Sygate Pro which unfortunately is no longer supported by recent operating systems....
Drive Encryption BitLocker I'm currently encrypting my 2TB files drive on D:\ and my 500GB C:\ Drive on windows 10 using Bitlocker. This is for if you have to work from home with "Sensitive Documents" or files from work, or if you travel with a laptop that must have windows 10 due to applications needs or other factors. If you encrypt your device, the damage from theft or loss is much smaller than if left unencrypted. I will post some links to show how to enable Bitlocker without a "Trusted Platform Module" hardware unit. You will use a password. Select a strong password using passgen with around 20-40 characters and write it down and store it in a safe until you can memorize the sequence. Bear in mind that nothing that you do on windows 7,8,10 etc is private. Use this only for work files and documents that you need to protect from physical interdiction, theft or accidental loss that you must use with or in conjunction with Windows or Windows applications.
Go to the search tab and type firewall. Select windows defender firewall. Click on advanced settings. Block all incoming and outgoing traffic by default. Then wipe out all of the policies or click disable, better to click delete and remove them. Then add the policies that you need. Lock them down by application if need be. Play around with the detailed rules and use filters for programs, ports and ip addresses to get the desired effects for your network applications to work. Adding new programs magically changes your firewall settings, but go back and fix them after each new application install. Wipe out and delete all inbound rules. If you need to let inbound come in, then you should know enough about the application to configure it. Block everything and only let out/in what you need to go out/in, specific programs, ports and ip addresses.